首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 759 毫秒
1.
阿拉丁(Aladdin)是一家专门为全球企业提供软件保护和互联网安全技术的公司,成立于1985年,总部位于以色列特拉维夫,在全球拥有300多位员工和六个海外分支机构,同时为全球的30,000多个客户提供服务,主要提供软件反盗版、软件电子分发(ESD)和企业安全解决方案。其产品包括基于USB的eToken,用于用户认证和电子商务安全;保护个人电脑和网络安全的内容安全解决方案eSafe产品线;基于硬件的软件安全系统HASP和Hardlock;软件销售许可和分发的平台Privilege SCP。  相似文献   

2.
介绍了一个基于RMI通信的应用软件分发系统。该系统改进了传统软件分发的安装模式,采用分布式管理模式,使得管理员可以利用网络内任何一台计算机,实现对网络内其他计算机的软件分发、远程安装、远程删除和远程管理。  相似文献   

3.
数据库系统隐蔽通道分析的设计   总被引:1,自引:0,他引:1       下载免费PDF全文
张世明  何守才 《计算机工程》2006,32(18):133-134,
介绍了一个基于RMI通信的应用软件分发系统。该系统改进了传统软件分发的安装模式,采用分布式管理模式,使得管理员可以利用网络内任何一台计算机,实现对网络内其他计算机的软件分发、远程安装、远程删除和远程管理。  相似文献   

4.
由于软件的易复制性,非法用户可以轻易地从其他合法用户或者网络中获取软件的拷贝。因此,有必要制定一个安全的软件分发方案来保护软件开发者的利益。该文介绍了一种新型的基于CA的安全软件保护方案,能够有效地抵抗商用软件分发、安装和使用过程中所遭受的各种攻击。  相似文献   

5.
针对分布式军事指挥中心的软件分发和部署,进行了软件分发效率提升和软件部署稳定性和资源利用率提升的研究。为了提升软件分发效率,将软件划分为多个切片,同时利用其他指挥中心作为中继节点,通过不同路径并行传输,实现数据的协同传输。针对软件部署,考虑了负载均衡的问题,并利用改进的整数多背包模型构建了部署方案,以提高系统的稳定性和资源利用率,实现系统的稳定性和资源利用率的提升。仿真结果表明,该分发模型相比于传统的直传方式可缩短85%传输时间,软件部署模型相比于软件部署至最空闲服务器的贪婪模型最高可提升30%的资源利用率。分发和部署的实验证明,分发效率可平均缩短50%时间,部署资源利用率可实现接近20%的提升。  相似文献   

6.
通过分析软件分发过程中负载控制和流量控制的关键点,在原型系统的基础上设计并实现了一个基于可激活RMI框架的应用软件分发系统,系统可以实现B/S模式下的主动软件分发。实验结果表明,系统可以在较低负载下执行流量可控的大规模应用软件分发。  相似文献   

7.
McAfee Associates公司正在将安全和防病毒软件组合到一个单一的套件中。据McAfee公司的官员称,McAfee公司9月初发布了TVD(Total Virus Defense)套件,用于保护Internet网关和服务器的安全。这一新套件的核心部分是McAfee公司的Enterprise Console软件,该软件被设计用来监视网络活动和从一个中央服务器上分配更新的软件。通过与BackWeb Technologies公司的推送频道相结合,Enterprise Console软件将允许一个公司在几个小时的时间内将更新的软件(如防病毒软件)分发给最终用  相似文献   

8.
对于局域网来说,其下的工作站会经常地进行软件安装、升级、维护、删除操作,从而带来了繁重的工作量,而且由此可能产生的安全问题也一直是令所有网管头疼的事。如果你也是一名网管,那么你不妨通过Windows 2003来感受一下它的软件分发功能所带来的神奇“减负”魅力。简单地说.分发功能就是将软件分布发送到工作站上的功能。以往,很多网络管理员都采用共享的方  相似文献   

9.
论文介绍了一个基于RMI通信的应用软件分发系统。该系统改进了传统软件分发的安装模式,采用分布式管理模式,使得管理员可以利用任何一台网络内计算机实现对网络内其他计算机的软件分发、远程安装、远程删除和远程管理的功能。  相似文献   

10.
黄会 《多媒体世界》2008,(17):26-26
信息服务业是一个涉及信息生产、信息传输、信息分发与信息供给等众多领域的综合性行业;其产业价值链包括用户、运营商、设备制造商、软件开发商和内容提供商等多个环节,涵盖制造业和服务业两大领域。  相似文献   

11.
为提高系统解决问题和完成特定任务的效率,通常情况下除了改进系统运行的硬件环境外,可通过软件方式对系统需要完成的任务进行分解来协同完成。提出了一种启发式的任务分解与分配算法,并对该算法的性能进行了分析与评价。分析结果表明,该算法能够有效地提高任务的执行效率,符合复合泊松分布规律。  相似文献   

12.
汽车自适应巡航控制系统(ACCS)是一个完全的分布式嵌入式控制系统。该文采用硬件回路仿真的方法,设计了一个基于ARM的汽车ACCS仿真平台,介绍了平台的硬件结构和软件设计。  相似文献   

13.
为了防控公司网络中数千台终端带来的风险,安装并运行了桌面终端管理系统(Tivoli Endpoint Manager)。TEM的资产管理功能快速高效地跟踪IT资产,自动汇总网络中所有软硬件配置信息,以便管理人员全面掌握和评估公司网络内计算机资产情况和网络安全状况,同时限制用户使用非法软件,其高效安全的软件分发功能,可对公司网络所有终端统一进行软件的部署升级;TEM的终端安全管理功能建立了反病毒软件管理、对个人防火墙的监控和管理、网络系统内非法终端的管理、以及不允许更换硬件的控制;TEM补丁管理功能可以及时将补丁程序自动分发到网络中所有的计算机进行安装,并制作了多条基线,只要客户端一连上网络,就会自动对补丁基线进行匹配,进入补丁修复程序。公司桌面安全管理系统实施后,建立了统一的桌面设备资源和安全管理平台,提升了企业对桌面设备的信息化管理手段,提高了企业的信息化安全保障水平。  相似文献   

14.
付扬  唐海燕 《控制工程》2001,8(2):57-59
利用VisualC +语言支持的面向对象的程序设计方法在Windows环境下对基于微机的集散控制系统的软件组态问题进行了研究 ,介绍了该软件的结构和功能以及组态软件设计的一些关键方法 ,并详细描述了控制算法组态的实现方法。  相似文献   

15.
Fuzzing is known to be one of the most effective techniques to uncover security vulnerabilities of large-scale software systems.During fuzzing,it is crucial to distribute the fuzzing resource appropriately so as to achieve the best fuzzing performance under a limited budget.Existing distribution strategies of American Fuzzy Lop (AFL) based greybox fuzzing focus on increasing coverage blindly without considering the metrics of code regions,thus lacking the insight regarding which region is more likely to be vulnerable and deserves more fuzzing resources.We tackle the above drawback by proposing a vulnerable region-aware greybox fuzzing approach.Specifically,we distribute more fuzzing resources towards regions that are more likely to be vulnerable based on four kinds of code metrics.We implemented the approach as an extension to AFL named RegionFuzz.Large-scale experimental evaluations validate the effectiveness and efficiency of RegionFuzz-11 new bugs including three new CVEs are successfully uncovered by RegionFuzz.  相似文献   

16.
For a walking vehicle with active force control an important problem is how to distribute the forces of the feet. To prevent leg slippage, the active force control of a walking vehicle requires an efficient approach to optimize the foot force distribution. This article presents a new optimization method for a quadruped walking vehicle. We combine the force/moment equilibrium equations with some optimal relations and obtain a set of solvable linear equations. The solution of the equations is the optimal force distribution to prevent leg slippage. To solve the discontinuity problem of optimal solutions, we have used the principle of the convex combination that is an interpolation. Thus the optimal solution found with this algorithm is continuous during a complete locomotion cycle. To solve the force distribution problem for four feet on the ground the maximum computing time is 26 ms on an IBM-compatible DX 80386+803787 only. This optimization method is quite efficient for the controller in real time. © 1997 John Wiley & Sons, Inc.  相似文献   

17.
随着多媒体及网络的迅速发展,电子会议的应用将成为一个崭新而重要的课题。电子会议系统的关键在于会议密钥的分发,如何设计安全且高效的会议密钥分发协议,对许多网络安全工作者来说都是一个有趣的挑战。本文提出了一种基于可信赖服务器(TrustedServer,TS)的会议密钥分发协议。该协议不仅可以安全地分发密钥,还可以对与会者的身份进行认证。  相似文献   

18.
Computer‐based control systems have grown in size, complexity, distribution and criticality. In this paper a methodology is presented to perform an ‘abstract testing’ of such large control systems in an efficient way: an abstract test is specified directly from system functional requirements and has to be instantiated in more test runs to cover a specific configuration, comprising any number of control entities (sensors, actuators and logic processes). Such a process is usually performed by hand for each installation of the control system, requiring a considerable time effort and being an error‐prone verification activity. To automate a safe passage from abstract tests, related to the so‐called generic software application, to any specific installation, an algorithm is provided, starting from a reference architecture and a state‐based behavioural model of the control software. The presented approach has been applied to a railway interlocking system, demonstrating its feasibility and effectiveness in several years of testing experience. Copyright © 2008 John Wiley & Sons, Ltd.  相似文献   

19.
Increasing studies in marketing and distribution channels have shown that the power of manufacturers and retailers is reversing. In this paper, we consider a pricing decision problem in which two different manufacturers compete to distribute differentiated but substitutable products through a common retailer under different power structures. The manufacturing costs, sales costs and demands are characterized by uncertain variables. Meanwhile, uncertainty theory and game-theory-based modeling approaches are employed to formulate the pricing decision problem with three different power structures under uncertain environment. How to make the optimal pricing decisions on wholesale prices and retailer markups under three possible scenarios is derived. Numerical experiments are also given to examine the effects of power structures on the equilibrium prices and profits in uncertain environment. It is found that if the sales cost is high, consumers can enjoy lower prices when facing a powerful retailer and the super retailer can also make the supply chain more efficient.  相似文献   

20.
The problem of deriving distributed implementations from global specifications has been extensively studied for a number of application domains. We explore it here from the knowledge perspective: A process may decide to take a local action when it has enough knowledge to do so. Such knowledge may be acquired by communication through primitives available on the platform or by static analysis. In this paper, we want to combine control and distribution, that is, we need to impose some global control constraint on a system executed in a distributed fashion. To reach that goal, we compare two approaches: either build a centralized controlled system, distribute its controller and then implement this controlled system on a distributed platform; or alternatively, directly enforce the control constraint while implementing the distributed system on the platform. We show how to achieve a solution following the second approach and explain why this is a pragmatic and more efficient strategy than the other, previously proposed one.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号